Acceptable+Use+Policy+and+Agreements


 * Learning Technologies  ||
 * Learning Technologies  ||
 * Learning Technologies  ||

[|ATLE Members in Dialogue. 3] [|Desired Accomplishments of the Process. 3] [|Outcomes. 3] [|Brainstorming. 4] [|Brainstorming Results. 5] [|GUIDELINES AND PROCEDURES.. 7] [|NETWORK RESOURCES ACCEPTABLE USE PROTOCOL. 1] [|Introduction. 1] [|Principles of Use. 1] [|Conditions of Use. 1] [|Nine Elements of Digital Citizenship (ISTE 2009). 1] [|NETWORK RESOURCES ACCEPTABLE USE PROTOCOL FOR STAFF. 3] [|Introduction. 3] [|Principles of Use. 3] [|Conditions of Use. 3] [|Acknowledgement. 4]
 * Contents **

==

· James Aitchison – Foothills School Division · Gail Young – Livingstone Range · Greg Wedman – Wildrose · Donna Holloway, Robert Tymofichuk – St. Paul Education Regional Division · Jody Watson – Battle River · Mark McWhinnie – Wolf Creek · Gary Spence – Wolf Creek · Bevan Daverne – Golden Hills · Scott Mahan – Rocky View · Michelle Khatib – Red Deer Catholic Regional Division · Regrets: Scott Brandt – Grasslands, Edna Dach – Alberta Education, Matt Norton – Hastings and Prince Edward School District, ON ==

· Parental Awareness · Aspect of Due Diligence Met · Jurisdictional Consistency · Geared toward all users of Network Resources · Clear Teacher Expectations (Modeling of Appropriate Use) · Usage as an Educational Tool vs. an Agreement == There are two main documents to be generated by this group:

a) A template for technology use policy at the district level b) An acceptable use agreement/guideline for signed use or for embedded use in student handbooks.

[] == = =

==

Nine Elements of Digital Citizenship - [|link]

1. Full electronic participation in society. Can all users participate in a digital society at acceptable levels if they choose? 2. Electronic buying and selling of goods. Do users have the knowledge and protection to buy and sell in a digital world? 3. Electronic exchange of information. Is there an understanding of the digital communication methods and when they are appropriate? 4. The capability to use digital technology and to know when and how to use it. Have users taken the time to learn about digital technologies? Do they share that knowledge with others? 5. The standards of conduct expected by other digital technology users. Do users consider others when using digital technologies? 6. The privileges and freedoms extended to all digital technology users and the behavioral expectations that come with them. Are users ready to protect the rights of others to defend their own digital rights? 7. The elements of physical and psychological well-being related to digital technology use. Do users consider the risks (both physical and psychological) when using digital technologies? 8. T he legal rights and restrictions governing technology use. Are users aware of laws (rules, policies) that govern the use of digital technologies? 9. The precautions that all technology users must take to guarantee their personal safety and the security of their networks. Do users take the time to protect their information while creating precautions to protect others’ data as well?

Next Steps

Michelle Khatib ||  || 22 Jan 2010 ||
 * ** Task ** || ** Responsibility ** || ** Details ** || ** Date ** ||
 * Draft Policy || James Aitchison ||  || 15 Jan 2010 ||
 * Review Draft Policy || Gail Young
 * Next Group Meeting || James Aitchison ||  || 2 Feb 2010 from 1 PM – 2PM ||
 * Development of Learning Tool? || Volunteers? ||  || TBD ||
 * Draft of AU Agreement if Necessary || ? || Driver’s License etc., Passport to the Internet || TBD ||
 * Recommendation to ATLE || James Aitchison ||  || Spring 2010 ||

Foothills School Division is committed to maintaining integrated network resources to support learning, to maximize the impact of support services, and to connect the work of the division to the larger community.  The Assistant Superintendent is responsible for the administration of this policy. Definition: "Network resources" refers to all hardware, software, services (such as e-mail and Internet access) and information resources (such as ePearl and Joomla) accessed by authorized users of the Foothills network.

**// A. __Planning and Administration__ //**
A technology plan for network renewal, technology infusion and division-wide professional development and implementation related to the infusion of technology will be maintained by Learning Technologies collaboratively with Learning Services. Divisional planning shall include a technology component developed by Learning Technologies to be reviewed annually. Annual school plans will include a //“technology for learning”// component which will assure: 3.1 equitable and appropriate access for all students; 3.2 achievement of the outcomes of the Program of Studies as they relate to the infusion of technology; and 3.3 appropriate access for staff in the performance of responsibilities.

The school principal is responsible for this planning. Directors and supervisors will consult with Learning Technologies in developing plans for integration of information and communication technology into operations.

**//B.//** __**//Access to Network Resources//** __
<span style="font-family: 'Arial','sans-serif';">1. Network resources should be used safely and responsibly as described in student handbooks and outlined in ISTE’s Nine Elements of Digital Citizenship at http://www.iste.org/Content/NavigationMenu/EducatorResources/YourLearningJourney 2. All access to //Foothills School Division Network Resources// is subject to the general policies and practices of the division. <span style="font-family: 'Arial','sans-serif'; font-size: 12pt;">3. Personal devices used to access network resources must adhere to the following conditions: <span style="font-family: 'Arial','sans-serif'; font-size: 12pt; line-height: 115%;">3.1 there must be no violation of licensing agreements; 3.2 access is achieved through processes defined and supported by Learning Technologies; 3.3 liability for loss, damage or theft of the device resides solely with the user; and 3.4 support of the device resides solely with the user.

<span style="font-family: 'Arial','sans-serif';">**//C.//** __<span style="font-family: 'Arial','sans-serif';">**//Management of Network Resources//** __
<span style="font-family: 'Arial','sans-serif';">1. All infrastructure work will be coordinated through Learning Technologies which will establish standards for the work. <span style="font-family: 'Arial','sans-serif'; font-size: 12pt;">2. Software installation must be done in consultation with staff from Learning Technologies, subject to the following conditions: <span style="font-family: 'Arial','sans-serif'; font-size: 12pt; line-height: 115%;"> 2.1 appropriate licensing must be obtained prior to activating an installation; 2.2 evidence of all software licenses purchased by a school or department must be readily available for audit. It is the responsibility of the principal or department manager, in collaboration with a Technology Facilitator, to maintain such evidence; 2.3 the department that purchased the software must maintain evidence of all software licenses purchased by the division; and 2.4 all software must be registered in the name of Foothills School Division. <span style="font-family: 'Arial','sans-serif'; font-size: 12pt;">3. No personal software may be installed onto the network or onto individual division-owned computers. 4. Network storage areas are the property of the division. Network administrators may review files and communications to ensure system integrity and responsible use of resources.

<span style="font-family: 'Arial','sans-serif';">**//D.//** __<span style="font-family: 'Arial','sans-serif';">**//Intellectual Property and Copyright//** __
<span style="font-family: 'Arial','sans-serif';">1. All users of network resources are required to respect copyright/licensing laws and regulations. The Board will not accept responsibility for a user who willfully and knowingly contravenes copyright or licensing laws. 2. Works covered by copyright that are developed by employees in the course of their employment shall be the intellectual property of the Board. Works covered by copyright that are developed by employees outside of school facilities, beyond the instructional day, not in the course of their employment, and intended for commercial distribution may be purchased by the Board subject to Policy G-110, Conflict of Interest.

==

Foothills School Division provides technology resources that support learning for students and staff or supports administrative operations. //Network resources// refers to all resources on the network of Foothills School Division. This includes, but is not limited to, Internet access, e-mail accounts, installed software, personal file storage and all hardware attached to the network. Networked technology is infused in the daily lives of students and its use as responsible citizens is implied.

ü Foothills School Division owns all network resources and has the right to monitor use of the network resources. ü All network resources are for educational use. ü Network resources are valuable resources and should be used appropriately. ü The use of network resources is subject to all policies and practices of both the division and the school related to technology, property or conduct. ü Access to network resources with personal devices is subject to the policies and practices of Foothills School Division.

ü Students should use network resources for appropriate educational purposes only. ü Students will not publish on the Internet or in publicly viewed file personal information about themselves or other students. ü Students who discover material on the network that is inappropriate or makes them feel uncomfortable should report the material to a staff member. ü Students will only use their assigned login in the manner intended. This includes accessing only network resources assigned to their login. Students will not use another person’s files, output or user name. ü Students are responsible for the security of access (login and password) to their network resources. In particular, do not tell others your password or leave a workstation where you are logged in. Change your password regularly. Students are responsible for problems caused by use of their login by other individuals. ü Students will not decrease the operation of and access to network resources through inappropriate use of network resources, malicious activity directed against network resources or through unauthorized use of personal programs/data files. ü Access to network resources with personal devices requires the permission of the school administration. ü Consequences of inappropriate use of network resources could include loss of network privileges, withdrawal from a course, suspension, financial liability for damages, legal action.

Nine Elements of Digital Citizenship (ISTE 2009)

 * 1) Full electronic participation in society. Can all users participate in a digital society at acceptable levels if they choose?
 * 2) Electronic buying and selling of goods. Do users have the knowledge and protection to buy and sell in a digital world?
 * 3) Electronic exchange of information. Is there an understanding of the digital communication methods and when they are appropriate?
 * 4) The capability to use digital technology and to know when and how to use it. Have users taken the time to learn about digital technologies? Do they share that knowledge with others?
 * 5) The standards of conduct expected by other digital technology users. Do users consider others when using digital technologies?
 * 6) The privileges and freedoms extended to all digital technology users and the behavioral expectations that come with them. Are users ready to protect the rights of others to defend their own digital rights?
 * 7) The elements of physical and psychological well-being related to digital technology use. Do users consider the risks (both physical and psychological) when using digital technologies?
 * 8)  T he legal rights and restrictions governing technology use. Are users aware of laws (rules, policies) that govern the use of digital technologies?
 * 9) The precautions that all technology users must take to guarantee their personal safety and the security of their networks. Do users take the time to protect their information while creating precautions to protect others’ data as well?

==

Foothills School Division provides technology resources that support learning for students and staff or that support administrative operations. Network resources refers to all resources on the network of Foothills School Division. This includes, but is not limited to, Internet access, e-mail accounts, installed software, personal file storage areas and all hardware attached to the network.

ü All network resources are intended for educational use. ü As the owner of all network resources, Foothills School Division has the right to monitor their use. ü Network resources are valuable and should be used appropriately to support the learning and business activities of Foothills School Division. Network resources must not be used for purposes that are illegal, unethical or immoral. ü The use of network resources is subject to all policies and practices of both the division and individual schools/sites related to technology, property or conduct. In particular, staff members are expected to abide by the regulations and concepts of Policy H-426. ü Thoughtful approaches to the integration of emerging technologies in a safe and transparent manner that benefit student learning will include prior…

ü Staff is expected to use network resources to further the mission of Foothills School Division. Appropriate personal use of the network is permitted provided the use does not interfere with the user's work performance, interfere with any other user's performance, have undue impact on the operation of the network or violate any policy, guideline or standard of Foothills School Division. ü Staff will not publish on the Internet or in publicly viewed files personal information about themselves or other network users. Any such publishing must meet the FOIPP guidelines established by Foothills School Division. ü Staff who discover material on the network that is inappropriate are expected to advise their school/department administrator or the Supervisor of Technology Services. ü Staff will only use their assigned login in the manner intended. This includes accessing only network resources assigned to their login. Staff will not use another person’s files, output or user name. ü Staff is responsible for the security of access (login and password) to their network resources. In particular, it is expected that staff will not share their password with others nor will they leave a workstation where they are logged in. Staff is expected to change passwords regularly. Staff is responsible for problems caused by use of their login by other individuals. ü Staff will not decrease the operation of and access to network resources through inappropriate use of network resources, malicious activity directed against network resources or through unauthorized use of personal program/data files such as executable (exe), wav or MP3 files. ü Access to network resources with personal devices is subject to the regulations of Policy H426. ü Consequences of inappropriate use of network resources could include loss of network privileges, suspension, financial liability for damages, disciplinary or legal action.

Nine Elements of Digital Citizenship (ISTE 2009)

 * 1) Full electronic participation in society. Can all users participate in a digital society at acceptable levels if they choose?
 * 2) Electronic buying and selling of goods. Do users have the knowledge and protection to buy and sell in a digital world?
 * 3) Electronic exchange of information. Is there an understanding of the digital communication methods and when they are appropriate?
 * 4) The capability to use digital technology and to know when and how to use it. Have users taken the time to learn about digital technologies? Do they share that knowledge with others?
 * 5) The standards of conduct expected by other digital technology users. Do users consider others when using digital technologies?
 * 6) The privileges and freedoms extended to all digital technology users and the behavioral expectations that come with them. Are users ready to protect the rights of others to defend their own digital rights?
 * 7) The elements of physical and psychological well-being related to digital technology use. Do users consider the risks (both physical and psychological) when using digital technologies?
 * 8)  T he legal rights and restrictions governing technology use. Are users aware of laws (rules, policies) that govern the use of digital technologies?
 * 9) The precautions that all technology users must take to guarantee their personal safety and the security of their networks. Do users take the time to protect their information while creating precautions to protect others’ data as well?

I understand and agree to follow the conditions of this Acceptable Use Protocol.

Staff Member Name (Print): _

Staff Member Signature: _

Date: